introduction to wolfasi: workshop on logical foundations of an adaptive security infrastructure

Post on 16-Jan-2016

42 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Introduction to WOLFASI: Workshop on Logical Foundations of an Adaptive Security Infrastructure. Leo Marcus The Aerospace Corporation Los Angeles July 13, 2004. Goals of Talk. Introduce Adaptive Security Infrastructure Discuss assurance and formalization - PowerPoint PPT Presentation

TRANSCRIPT

Introduction to WOLFASI:Workshop on Logical

Foundations of an Adaptive Security Infrastructure

Leo Marcus

The Aerospace Corporation

Los Angeles

July 13, 2004

Goals of Talk

• Introduce Adaptive Security Infrastructure

• Discuss assurance and formalization

• State some tentative definitions and theorems

Need for Adaptive Security

• Static security architectures cannot cope with rapidly changing security environment, including:– physical parameters– threats– attacks– policies– mission goals

• Systems designed for extended many-decade life– Cannot predict and handle future threats by current

built-in non-flexible mechanisms

Goal for Logical Foundations of an ASI

• Understand how such a system works!

Need for Assurance

• Systems are being specified, designed, and built without a good method for architecting system-wide adaptive security mechanisms, and without a good method for gaining confidence that the mechanisms to be employed will deliver what, and only what, is needed.

• Without assurance, the cure may be worse than the disease.

Need for Formalization of Adaptive Security

• Assurance that proposed adaptive security mechanisms will perform as hoped (specified)

• Currently: rather haphazard collection of devices, poorly specified, with some testing

• Near future: rigorous specification and analysis• Distant future: formal specification and proof.• To begin: formalize significant aspects of

proposed real system

Possibility of Proof

• How can we prove anything about such a complicated system, when we can barely prove the most rudimentary security properties of the most rudimentary devices?

• Answer: hierarchy!– Assuming the building blocks (protocols, algorithms,

devices, interfaces) work as advertised, how do they function together?

• Define the problems that components must solve

Adaptive Security Infrastructure (ASI)

• Unified approach conceptually composed of – Sensor, – Analysis, and – Response capabilities

• To coordinate– Detection of security-relevant input– Security policy– User input– Analysis– Response

Adaptive Security Infrastructure

EnvironmentalSensors

Virus Defs

Threat Warnings

Analyzer and PolicyEngine

User

IDS outputs

Responder

(Rest of the)

System

DetectorUser

Adaptive Security Infrastructure

EnvironmentalSensors

Virus Defs

Threat Warnings

Analyzer and PolicyEngine

User

IDS outputs

Responder

(Rest of the)

System

Detector

UserUser

Adaptive Security Infrastructure

EnvironmentalSensors

Virus Defs

Threat Warnings

Analyzer and PolicyEngine

User

IDS outputs

Responder

(Rest of the)

System

Detector

UserUser

Adaptive Security Infrastructure

EnvironmentalSensors

Virus Defs

Threat Warnings

Analyzer and PolicyEngine

User

IDS outputs

Responder

(Rest of the)System

Detector

UserUser

Potential ResponsesI. Defensive: intended effect internal

• allocation of resources (e.g. power; turning devices on or off)

• routing (including or excluding nodes)• access rights• crypto algorithms, keys, protocols• sensor networks• auditing• authentication• intrusion detection system settings (altering the false

positive/negative ratio)• patches• device or data destruction• installation of new hardware or software

Potential ResponsesII. Offensive: intended effect external

• Electronic – bombs, etc.

• Physical– bombs, etc.

State of the Art

• Much work on detailed aspects of specific components– Intrusion detection– Sensor networks– Architectures– Security policies

• Much less work on unifying principles

Principles for Formalization• Mathematical logical framework• Abstract from realistic scenarios• Not directly concerned with

– Usability– Current technology

• Long term goal: uniform semantics to allow rigorous specifications and verifications of– Architectures– Properties– Capabilities

• Should yield coherent and interesting research directions for component areas

Basic Assumptions• ASI exists in a temporal and spatial world

• Policy, detection, analysis, and response all have temporal and spatial aspects that must be first class citizens in the formalism

• Otherwise, significant and interesting real issues will not be modeled

• Need common semantics connecting policy, detection, analysis, response

Research Issues• 1. How should the semantics of a dynamic

security policy be specified?• 2. How should we take into account the global-

local nature of all components of an ASI?• 3. How should we specify the "security-relevant

resources" available so that at any time the analyzer can choose an appropriate response?

• 4. How should we unify the temporal-spatial reasoning aspects?

• 5. What are the decidability or complexity issues in such a system?

• 6. What is the role of "approximate security"?

Research Issues: Spatial

• Hierarchical architecture

• Central (local) and distributed (global) detection, analysis, and response coordination

• Smooth transition between hierarchies

• Testability of policy satisfaction

• Enforceability of response

Research Issues: Temporal

• Duration of response

• Synchronization

• Relative speeds of changing environment, detection, analysis, communication, response

• Incorporation of time in policy

• Acknowledgments, success reports

Three examples

• Dynamic security policy– Specification language– Analysis– Testing for adherence or consistency

• Pervasive hierarchy assumption– All aspects of ASI are hierarchical

• Response specification– As a dynamically changing resource/scheduling problem– Language and semantics (effect, efficiency, etc.)

Goals for Specification of Adaptive Security Policy

• Facilitate analysis:• Test/prove adherence or consistency• Provide an umbrella guide for deciding if

future events, actions, or responses are to be permitted or tolerated

• Automate reasoning about policy change within the context of larger policy or policy hierarchy

The Pervasive Hierarchy Assumption

• Arbitrary architectural structures (patterns of connectivity, e.g. networks) can exist within the system and within the ASI

• These structures may be dynamically changing

• Any aspect of specification, detection, analysis, or response can be considered in a version relativized to any structure

Defining Local Policy

Let H be a hierarchy description, A an ASI specification (not individual instantiation), and P a policy.

1. P is local with respect to H in A if the satisfaction of P in A is dependent only on the satisfaction of some other (“test”) policy in all subsystems satisfying H.

2. Play with quantifiers1. For all instantiations of A there is a test policy

for P such that…2. There is a test policy for P such that for all

instantiations of A…3. ….in some subsystems satisfying H

Specification, Derivation, and Verification of Response

• A response is a distributed program/algorithm to be run concurrently with ongoing ASI operation

• Specify and evaluate responsive resources– Including communication channels, if needed– Current strength and location

• Plan appropriate action in time and space• Coordinate response with analysis

– Temporary and local fixes while long-term global solution is researched

Other Topics

• Approximate security– Specify achievable security goals

• Statistical properties

• Game-theoretic view– Between environment and ASI– Restrict the environment and design the ASI so

the adversary does not have a winning strategy

Future Theorem

• For any system S implementing the specification S

• For any ASI A implementing the specification A

• For any dynamic security policy P of type P• For any environment E satisfying

conditions E

• S+A satisfies P in E

Problem

• Given E, P, and S, find A, as in previous slide

• As E gets more “realistic”, P has to get weaker in order for there to be any hope of finding an appropriate A.

• This weakening can be– Temporal (allow for longer lapse)– More approximate (allow for less secure)

top related